{"id":3,"date":"2022-03-23T07:30:43","date_gmt":"2022-03-23T07:30:43","guid":{"rendered":"http:\/\/veroce.loc:8888\/?page_id=3"},"modified":"2025-01-28T20:01:01","modified_gmt":"2025-01-28T20:01:01","slug":"adatkezelesi-tajekoztato","status":"publish","type":"page","link":"https:\/\/verocelimes.hu\/en\/adatkezelesi-tajekoztato\/","title":{"rendered":"Data processing information"},"content":{"rendered":"<div id=\"fws_69d4f84276a9e\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-overlay=\"false\"><div class=\"inner-wrap\"><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Acting within the scope of my duties as set out in Sections 24 (3) and 30 (6) of Act CXII of 2011 on the Right to Informational Self-Determination and Freedom of Information, I hereby establish the data protection and data security regime of the Ver\u0151ce Mayor's Office (hereinafter: institution), as an institutional data controller, as follows:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>I. <\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>GENERAL PROVISIONS<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1. Scope of the regulations <\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.1.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> The personal scope of the regulations extends to the employees of the Ver\u0151ce Mayor's Office and to employees in a legal relationship with the institution.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.2.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> The scope of the regulations covers all administrative and file management procedures at the institution, regardless of the data management method.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2. Interpretative provisions<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">: the form of appearance of information, i.e. the uninterpreted but interpretable form of communication of facts and ideas;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Personal data<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> data relating to the data subject \u2013 in particular the name, identification number and one or more specific physical, physiological, mental, economic, cultural or social characteristics of the data subject \u2013 and any inferences relating to the data subject that can be drawn from the data;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Special data:<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">a) personal data relating to racial origin, nationality, political opinion or party affiliation, religious or other ideological beliefs, membership of an interest-representative organization, and sexual life,<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">b) personal data relating to health status, pathological addiction, and criminal personal data;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Public interest data<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> information or knowledge recorded in any way or form, which is managed by a body or person performing a state or local institutional task or other public task specified by law and is related to its activities or generated in connection with the performance of its public task, and which does not fall under the concept of personal data, regardless of the method of processing, its independent or collective nature, in particular data relating to competence, jurisdiction, organizational structure, professional activity, its evaluation including its effectiveness, the types of data held and the laws governing its operation, as well as management and concluded contracts;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Public data in the public interest:<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> all data not falling within the concept of public interest data, the disclosure, accessibility or accessibility of which is ordered by law in the public interest;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Contribution<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> the voluntary and definite declaration of the data subject's will, based on adequate information and by which she gives her unambiguous consent to the processing of personal data concerning her, in full or in relation to certain operations;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data controller<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> the natural or legal person or organisation without legal personality who, alone or jointly with others, determines the purposes of the processing of data, makes and implements decisions relating to the processing of data (including the means used), or has them implemented by a data processor entrusted by him\/her;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data management<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> any operation or set of operations performed on data, regardless of the method used, including in particular collection, recording, recording, organisation, storage, alteration, use, consultation, transmission, disclosure, alignment or combination, blocking, erasure and destruction, as well as preventing further use of data, taking photographs, sound or image recordings and recording physical characteristics suitable for identifying a person (e.g. fingerprints or palm prints, DNA samples, iris images);<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data transmission<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> making the data accessible to a specific third party;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Disclosure<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> making the data accessible to anyone;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data deletion<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> making data unrecognizable in such a way that its recovery is no longer possible;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data destruction<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> complete physical destruction of the data medium containing the data;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data processing<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> performing technical tasks related to data processing operations, regardless of the method and means used to perform the operations and the place of application, provided that the technical task is performed on the data;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data processor<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> the natural or legal person, or an organization without legal personality, who processes data based on a contract concluded with the data controller - including a contract concluded based on the provisions of the law;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data set<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> the set of data managed in a register;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Third person<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><i>:<\/i><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> a natural or legal person or an organization without legal personality who is not the same as the data subject, the data controller or the data processor;<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Trade secret<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> any fact, information, solution or data related to economic activity, the disclosure of which, the acquisition or use of which by unauthorized persons would harm or endanger the legitimate financial, economic or market interests of the right holder \u2013 not including the Hungarian state \u2013 and in order to keep it secret, the right holder has taken the necessary measures.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Administrator: <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">A person authorized to set up users and permissions for a given program.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3. General provisions<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.1.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> All officers and employees are required to comply with the provisions of the data protection policy. The Registrar monitors the enforcement of the policy, as well as the provisions of data protection laws and other regulations, through the internal auditor and the data protection officer.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.2.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> The President is personally responsible for ensuring the protection of personal data processed at the institution, which includes the following:<\/span><\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: medium;\"><span style=\"font-family: Garamond, serif;\">a. <\/span>Data generated and managed by the given organizational unit during the performance of the task.<br \/>\n<\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: medium;\"><span style=\"font-family: Garamond, serif;\">b. <\/span>Data received from another body or organizational unit.<br \/>\n<\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: medium;\"><span style=\"font-family: Garamond, serif;\">c. <\/span>Data for which they have been granted access or use rights.<br \/>\n<\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: medium;\"><span style=\"font-family: Garamond, serif;\">d. <\/span>All data that is not directly necessary to perform their duties, but that they have become aware of through various information channels during their work.<br \/>\n<\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.3. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The president is personally responsible for ensuring the disclosure of public interest data at the institution. Requests for access to public interest data must be submitted to the president or the registrar, and the president is responsible for fulfilling them. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.4.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> The institution may process personal data if:<\/span><\/span><\/span><\/span><\/p>\n<ol type=\"a\">\n<li>\n<p align=\"justify\"><span style=\"font-size: medium;\">the data subject consents to it, or<\/span><\/p>\n<\/li>\n<li>\n<p align=\"justify\"><span style=\"font-size: medium;\">it is ordered by law or \u2013 based on the authorization of law, within the scope specified therein \u2013 by a decree of a local institution for a purpose based on public interest.<br \/>\n<\/span><\/p>\n<\/li>\n<\/ol>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.5. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">In order to protect data files managed electronically in various registers, it must be ensured through appropriate technical solutions that the data stored in the registers cannot be directly linked and assigned to the data subject, unless permitted by law.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.6.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> When processing personal data files, the right to the protection of personal data and the personal rights of the data subject may not be violated by other interests related to data processing, including the disclosure of data of public interest, unless an exception is made by law.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.7.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> Personal data may only be processed for specific purposes, in order to exercise rights and fulfill obligations. Data processing must comply with the purpose of data processing at all stages, and the collection and processing of data must be fair and lawful.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.8. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Only personal data that is essential for the purpose of data processing and suitable for achieving the purpose may be processed. Personal data may only be processed to the extent and for the period necessary to achieve the purpose.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.9.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> Data processing operations must be designed and implemented in such a way as to ensure the protection of the privacy of data subjects in accordance with the applicable laws.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.10. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The data controller:<\/span><\/span><\/span><\/span><\/p>\n<ol type=\"a\">\n<li>\n<p align=\"justify\"><span style=\"font-size: medium;\">The data controller may only use the classified data that has come to his knowledge for the performance of his duties, may not disclose it to unauthorized persons, and may not release any information without the permission of his manager. The data controller is obliged to deny all forms of data access and use to unauthorized data requesters or applicants. The data controller is personally liable for the handling of data that has come to his knowledge.<br \/>\n<\/span><\/p>\n<\/li>\n<li>is obliged to keep the business secret that he has come to know in the course of his work - taking into account the provisions of Section 81 of the Civil Code - and essential information about the employer and its activities. In addition, he may not disclose to an unauthorized person any data that he has come to know in connection with the performance of his job, the disclosure of which would have adverse consequences for the employer or another person. Confidentiality does not extend to the disclosure of data of public interest and the obligation to provide data and information specified in a separate law regarding data that is public in the public interest.<\/li>\n<\/ol>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.11. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Anyone who detects unlawful data processing is obliged to call on the data controller to cease the unlawful data processing, and is obliged to inform the immediate manager and the data protection officer about the detection of unlawful conduct, the person who processes the data and the scope of the processed data. The immediate manager is obliged to inform the president about the detection of unlawful data processing, and is also obliged to take all necessary measures to eliminate the unlawfulness and mitigate and prevent damage resulting from the unlawful data processing.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>II. <\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>DATA PROTECTION ORGANIZATION<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1. The president<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">It performs the tasks assigned to its competence by law, including:<\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p align=\"justify\"><span style=\"font-size: medium;\">Publishes the privacy and data security policy.<\/span><\/p>\n<\/li>\n<li>\n<p align=\"justify\"><span style=\"font-size: medium;\">Appoints the institution's data protection officer.<\/span><\/p>\n<\/li>\n<li>\n<p align=\"justify\"><span style=\"font-size: medium;\">Decides on the identity of data maintainers outside the organization and the contract for data maintenance.<\/span><\/p>\n<\/li>\n<li>\n<p align=\"justify\"><span style=\"font-size: medium;\">It checks data management and data protection, as well as IT records, through the internal auditor, directors, department heads, and the data protection officer.<br \/>\n<\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2. The data protection officer<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.1. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">It contributes and provides assistance in making decisions related to data management and in ensuring the rights of data subjects.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.2.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> It monitors compliance with the provisions of data processing legislation, internal data protection and data security policies, and data security requirements.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.3.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> It investigates the reports received and, if unauthorized data processing is detected, calls on the data controller or data processor to terminate it.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.4. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Prepares and continuously updates the internal data protection and data security policy.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.5.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> It provides training on data protection.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.6. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Upon request, it provides opinions on board and committee proposals from a data protection perspective.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.7. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">It provides opinions on requests for data provision upon request.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.8. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">It compiles a record of the rejection of requests for public interest data and the reasons for the rejections, and then informs the National Data Protection and Freedom of Information Authority of the contents thereof by January 31st of each year.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.9<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">. Performs data protection tasks as determined by the president from time to time.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3. The data controller<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.1. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">He\/she manages the data related to his\/her job, may only manage other data in case of substitution, and keeps the records.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.2. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Provides data to a person or organization authorized by law.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.3. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">It keeps the data and data provision records.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.4. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">It preserves the information it has obtained.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.5. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">She ensures that unauthorized persons cannot access the data in the register she keeps, and ensures that the register is stored securely.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.6. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Complies with the provisions on data management, data protection and data security.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.7. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Immediately informs IT specialists of any malfunction of IT equipment or any problems with the manageability of the data file.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.8. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The data controller is obliged to inform his\/her direct manager and the data protection officer of any event in which he\/she has been asked or instructed to engage in unlawful data processing, or has experienced any other unauthorized data access or data processing in his\/her own system.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>III. <\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>REGISTRATION AND DATA PROCEDURE<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1. Records management<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.1. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Data can be recorded electronically or manually. Important data files cannot be stored on the computers' own storage; they are stored exclusively on the network.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.2. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Data access rights determine which data controllers have access (read) and which data controllers have modification (enter, change, delete) rights to the recorded data.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.3. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The access rights for records kept on the computer are set by the administrator of the given program. The administrator is required to keep an up-to-date record of the access rights of the data controllers. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.4. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The president, the data protection officer, has the right to inspect the register of access rights. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2. Data provision procedure<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.1. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Data provision can be done upon request and ex officio.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.2. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The data provision on request may be made orally, in writing or electronically. In the case of an oral data request, the data provision is made via a data provision request form, which is filled in by the applicant (Annex 1).<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.3. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Requests for data provision must be filed and recorded manually or electronically in the form specified in Annex 2. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.4. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Personal data may only be provided if the legal requirements are met. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.5. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">When requesting data necessary to enforce his or her rights or legitimate interests, the applicant is obliged to prove the fact or event that provides the basis for the purpose of data use, which exists or existed between him or her and the data subject.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.6. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Each department may only fulfill a request for personal data if the requested data falls within its control. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.7. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Requests for information concerning data of public interest and data made public in the public interest must be submitted to the President. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.8. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">In the event of a conflict between personal and public interest data, the fundamental right to the protection of personal data and the fundamental right to access public interest data must be interpreted in relation to each other, and the hierarchy of these two fundamental rights must always be established with regard to the subject matter of the issue under consideration. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.9. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">If there is any doubt regarding the legality, feasibility or other related circumstances of the data request, each data controller is obliged to seek the opinion of the data protection officer.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.10. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">After examining the request, the data protection officer will decide on its feasibility within 3 days, or provide assistance in clarifying doubtful circumstances.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.11. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Requests for access to data of public interest must be fulfilled within 15 days, in a comprehensible form with the necessary details. In the case of significant volume or a large number of data, the processing deadline may be extended by 15 days once. The refusal of the request must be communicated within 8 days, with reasons. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.12.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> Prior to the execution of the application, the applicant must be informed of the amount of the reimbursement to be paid based on Annex 3 within 8 days of receipt of the application.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.13. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The applicant may withdraw their application at any time until the data provision is completed.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.14. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">From the data provision register, each department prepares a summary report on rejected requests and the reasons for the rejection for the data protection officer by January 15th of each year. The data protection officer compiles the report forwarded by the departments and informs the National Authority for Data Protection and Freedom of Information by January 31st.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.15. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The data access procedure is governed by the rules of the data provision procedure, mutatis mutandis.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.16. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The rules applicable to documents shall apply to the procedure for inspection of image and audio material. The amount of compensation for costs incurred in connection with the provision of data shall be determined in accordance with Annex 3. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>IV.<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>DATA PROTECTION AND DATA SECURITY<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1. Infrastructure-related security measures<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.1.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> Other persons may enter or remain in the premises or work area where data files are managed and stored only in the presence of the administrator or the competent manager managing the given data file. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.2. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Customers may only be in the area designated for customer reception, with the constant presence of an administrator. These rooms must be kept locked during the absence of the authorized person. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.3. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The room used to store server machines may only be entered or stayed in the presence of an IT specialist or the head IT specialist. No one may be in the server room in the absence of the IT specialist or the head IT specialist.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.4. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The administrator managing the data file must log out of the programs he or she uses during his or her absence, thus preventing unauthorized data access. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Computers in office premises must be placed and used in such a way that the information displayed on the screen is not visible to unauthorized persons (e.g. customers, etc.). During work breaks, the computer must be reset so that the information and documents are not visible.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.5.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">.The data controller is obliged to keep its own passwords secret and may not pass them on to a third party under any circumstances. Any act committed with the data controller's password is the responsibility of the data controller. If the data controller notices that its password has become known to an unauthorized person, it is obliged to change its password immediately and report this fact to the data protection officer. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.6.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> The receipt of keys to rooms and data storage cabinets is authenticated by the signature of the recipient in the key register. The key register is kept up to date by the caretaker.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.7. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The right holder may not transfer the keys to the premises and devices used to manage and store data files to another person, even temporarily.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.8.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> Copies of keys to premises and data storage devices may only be made in justified cases, with the written permission of the department head. The fact of key copying and the details of the person authorized to use the copy must be entered in the key register.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.9.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> The administrator shall put the alarm in the rooms equipped with an alarm into operation at the end of the day's work. The operability of the alarm devices must be checked monthly. The fact and the result of the check are recorded in the key register book and authenticated by their signature.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.10.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> Alarm systems should be equipped with a personal authorization (code) if possible to ensure traceability. The authorization register is kept up to date by the caretaker.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.11.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> The institution must have fire extinguishers in a state of readiness and in a number that meet fire safety regulations, with particular regard to computer rooms. The server room must also be equipped with separate fire safety equipment. The fire safety officer is responsible for ensuring that the fire safety equipment is provided and that it is operational.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.12.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> At the institution, all computing and IT-related equipment must be turned off at the end of the day's work, and the power supply must be disconnected. Server machines may only be turned off when necessary, and users must be notified in advance. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1.13.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> Security measures related to the infrastructure must be updated in the event of personnel changes.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2. Security measures related to hardware assets<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.1. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The use of computer equipment is primarily authorized by its operator, and in his\/her absence, by the employees of the organizational unit or by IT specialists. Only IT specialists are authorized to manage servers, and are responsible for their operation and operational security. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.2. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Only IT specialists are authorized to install hardware and software elements into the system, unless it is performed by the distribution company.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.3. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">During working hours, a member of the IT team must be available at all times to ensure that any malfunctions in the IT system can be resolved. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.4 <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">In the event of a malfunction in the IT system \u2013 the data controller notifies the IT specialists by indicating the error and symptoms. The IT specialists immediately begin troubleshooting and eliminating the malfunction. They report the failure of servers and services not operated by us to the service provider.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.5. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The maintenance of hardware devices, with the exception of multifunction machines and desktop printers, and the repair of malfunctions are carried out continuously by IT specialists. If the repair is not possible on site, the faulty device must be sent to a specialist service center.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3. Software-related security measures<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.1. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Software installation may only be performed by IT specialists in the entire IT system. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.2. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Data files stored on servers must be backed up regularly. Backups and their storage are handled by IT specialists.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.3. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Data maintenance is carried out continuously by the data manager. The data manager of the relevant data file is responsible for keeping the data file he manages up to date.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3.4. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">IT specialists provide assistance to data controllers in the management and use of computer programs and software, if required.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4. Protection measures related to data carriers and documents <\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4.1.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> Copies of data files may only be made for purposes necessary for the performance of the task within the framework of data security. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4.2.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> Copies of documents may only be made in connection with the performance of duties and only in the justified number of copies. Defective, unused copies must be destroyed.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4.3. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The retention period and archiving of paper-based (manual) data carriers are carried out according to the archiving plan. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4.4. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Only the president, the administrator, the internal auditor, and the data protection officer have the right to inspect documents (files). Inspection and copying of documents by external persons is carried out in accordance with applicable laws. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4.5. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">After release or disposal of digital data media, they must be erased using a process that results in the destruction of the data before being used again. When disposed of, computer data media cannot be thrown away; they are continuously collected by the IT department, and as they are hazardous materials, IT specialists ensure their removal.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4.6. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The transfer of data carriers (documents) or certain data between organizational units is based on the permission of the relevant director\/head of department. Only the transfer of data necessary for the performance of the duties may be permitted. The receipt of the data (documents, data carriers) must be confirmed by signature. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4.7. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">All stamps used at the institution must be registered \u2013 before being issued \u2013 with the name and position of the person authorized to use them indicated, and receipt must be confirmed by signature. Stamp purchases are authorized by the competent director\/head of department, and the tasks related to the purchase and registration procedure are performed by the guardianship.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4.8. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Stamps must be kept in a closed place at all times and may not be left in the open or unattended, even temporarily. Stamps may only be used by authorized personnel.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4.9. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The stamp may not be transferred to another person who is not authorized to use it, even temporarily. The person authorized to use the stamp shall be fully liable for any violation of this and any resulting damages.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>V.<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>SPECIAL RULES FOR THE HANDLING OF DOCUMENTS RELATED TO BOARD AND COMMITTEE MEETINGS (HEREIN: BOARD MEETINGS)<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The minutes of board meetings, committees, and board resolutions must be handled and recorded in a uniform manner. The minutes of closed meetings must be handled separately, in a closed place, but must be recorded together with the minutes of open meetings. The minutes must be recorded together with the proposals.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The IT department and the president are responsible for keeping up-to-date records of board minutes and resolutions. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>3. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The procedure for inspecting committee and board minutes \u2013 and providing data from them \u2013 is carried out in accordance with the data provision rules of the institution's SZMSZ.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>4. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Only local institutional representatives may be provided with information or be permitted to exercise their right of access to the minutes of closed meetings and to the parts of the minutes concerned with the agenda items discussed at the closed meeting. Non-representative members of committees shall only have the right of access to the minutes of closed meetings and to the proposals of the committee in which they are members. These provisions do not apply to data of public interest and data made public in the public interest. However, the possibility of obtaining data of public interest and data made public in the public interest must be ensured even in the case of closed meetings.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>5. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The agenda \u2013 proposals, minutes \u2013 of closed meetings may be delivered exclusively to local representatives, and the proposals of closed meetings of committees may be delivered exclusively to the committee members concerned.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>6. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Submissions and minutes to be delivered to the media - written and electronic press -, the library, or other external persons or bodies may not contain personal data.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>7. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The provisions of the document management regulations shall apply to the management of documents related to board meetings.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>8<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">. Board submissions are delivered on paper and via the internet, and access rights are defined on a personal basis.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><b>VI. <\/b><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><b>FINAL PROVISIONS<\/b><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>1. <\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The tasks and rights specified in the data protection policy must be included in the job descriptions.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>2.<\/b><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> These regulations come into force on December 1, 2017.<\/span><\/span><\/span><\/span><\/p>\n<div id=\"malwarebytes-root\"><\/div>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69d4f84278759\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-overlay=\"false\"><div class=\"inner-wrap\"><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Annex 1<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data request form<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Name of requesting organization or person:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Name and position of the head of the requesting organization:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Applicant's address:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Applicant's phone number:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Request date:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Requested method of data provision:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">\u2013 letter: postal address:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">\u2013 fax: fax number:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">\u2013 online: email address:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Request and purpose of data use:<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Legal basis for data request, list of related documents: \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026..<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\">...............................................................................................................<span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Type of data requested (personal, public interest):\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\">...............................................................................................................<\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The requested data\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.\u2026<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\">...........................................................................................................................<\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">The requested data can be found in Annexes \u2026\u2026.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Date of data provision: \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026..<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Person providing data: \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Date of authorization: \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Authorizing signature: \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026..,<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"> <span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> (president)<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">I declare that I will use the data provided to me exclusively for the purpose of the data request and that I will comply with data protection laws at all times.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: right;\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> .....................................<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: right;\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Signature of the data requester <\/span><\/span><\/span><\/span><\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69d4f84279108\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-overlay=\"false\"><div class=\"inner-wrap\"><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Annex 2<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Data provision register of personal and public interest data<\/b><\/span><\/span><\/span><\/span><\/p>\n<table width=\"1207\" cellspacing=\"0\" cellpadding=\"1\">\n<tbody>\n<tr valign=\"top\">\n<td width=\"115\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">Date of data provision<\/span><\/span><\/p>\n<\/td>\n<td width=\"116\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">The person requesting the data provision<\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">-organization designation<\/span><\/span><\/p>\n<\/td>\n<td width=\"116\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">Legal basis for data provision<\/span><\/span><\/p>\n<\/td>\n<td width=\"116\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">Purpose of data provision<\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">(in case of personal<\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">data provision<\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">only)<\/span><\/span><\/p>\n<\/td>\n<td width=\"116\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">The type of data provision,<\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">requested data<\/span><\/span><\/p>\n<\/td>\n<td width=\"116\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">Method of data provision<\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">(letter, fax, <\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">on-line)<\/span><\/span><\/p>\n<\/td>\n<td width=\"116\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">Legible signature of the person requesting data provision (in case of personal data request)<\/span><\/span><\/p>\n<\/td>\n<td width=\"116\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">Reason for refusal to provide data<\/span><\/span><\/p>\n<\/td>\n<td width=\"116\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">The person providing the data<\/span><\/span><\/p>\n<\/td>\n<td width=\"144\">\n<p class=\"western\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: small;\">The data provider<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td width=\"115\" height=\"2\"><\/td>\n<td width=\"116\"><\/td>\n<td width=\"116\"><\/td>\n<td width=\"116\"><\/td>\n<td width=\"116\"><\/td>\n<td width=\"116\"><\/td>\n<td width=\"116\"><\/td>\n<td width=\"116\"><\/td>\n<td width=\"116\"><\/td>\n<td width=\"144\">\n<p class=\"western\">\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><u><b>Comment:<\/b><\/u><\/span><\/span><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"> In the case of data provision concerning public interest data, the register shall be applied mutatis mutandis.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">In the event of data access, the data provision register must be applied accordingly.<\/span><\/span><\/span><\/span><\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69d4f842799a6\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-overlay=\"false\"><div class=\"inner-wrap\"><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Annex 3<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"center\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\"><b>Amount of reimbursement for data provision<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Paper-based document in digital form 100 HUF\/page<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">provision of (scanning) <\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">Photocopying of paper-based documents 100 HUF\/page<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">For CD material 300 HUF\/piece<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">For DVD material 500 HUF\/pc<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\"><span style=\"font-family: Calibri, serif;\"><span style=\"font-size: small;\"><span style=\"font-family: Garamond, serif;\"><span style=\"font-size: medium;\">In the case of image and audio material, only the price of the CD or DVD must be paid. <\/span><\/span><\/span><\/span><\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>","protected":false},"excerpt":{"rendered":"Act CXII of 2011 on the Right of Informational Self-Determination and Freedom of Information Act 24 (3) and 30 (6) of the Ver\u0151ce Mayor's Office (hereinafter: the institution), as...","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-3","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/verocelimes.hu\/en\/wp-json\/wp\/v2\/pages\/3","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/verocelimes.hu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/verocelimes.hu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/verocelimes.hu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/verocelimes.hu\/en\/wp-json\/wp\/v2\/comments?post=3"}],"version-history":[{"count":4,"href":"https:\/\/verocelimes.hu\/en\/wp-json\/wp\/v2\/pages\/3\/revisions"}],"predecessor-version":[{"id":588,"href":"https:\/\/verocelimes.hu\/en\/wp-json\/wp\/v2\/pages\/3\/revisions\/588"}],"wp:attachment":[{"href":"https:\/\/verocelimes.hu\/en\/wp-json\/wp\/v2\/media?parent=3"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}